In recent years, the continuous evolution of malicious software (malware) has posed an increasingly significant threat to governments, research institutions, businesses, and military organizations. Numerous malware variants have been developed with the aim of exfiltrating sensitive information, compromising industrial infrastructure operations, or extorting money causing serious financial, reputational, and operational repercussions for the affected entities. Among the most widespread types of malware are rootkits, botnets, spyware, trojans, and ransomware. Many of these, despite posing a serious threat, rely on traditional asymmetric cryptographic primitives such as Key Encapsulation Mechanisms (KEMs) and Digital Signature Algorithms (DSAs), which are vulnerable to the advent of Quantum Computing. An attacker equipped with a sufficiently powerful quantum computer could employ algorithms such as Shor's and Grover's to derive private keys from public ones, thereby compromising the entire security model upon which these systems are based. Consequently, the transition towards post-quantum cryptographic algorithms becomes imperative in order to guarantee robustness and long-term resilience in such adversarial scenarios. In this context, this study proposes the design and implementation of a post-quantum ransomware/mal-ware, capable of successfully fulfilling its objectives even in the presence of an adversary with quantum capabilities. The malware leverages post-quantum cryptographic primitives, integrated with a decentralized, blockchain-based PKI infrastructure compatible with quantum-resistant algorithms, thereby ensuring the system's resilience in a post-quantum cryptographic landscape.

QuantumCry: The Engineering and Implementation of a Post-Quantum Ransomware

Castiglione, Aniello;Loia, Vincenzo;Nappi, Michele;Narducci, Fabio
2025

Abstract

In recent years, the continuous evolution of malicious software (malware) has posed an increasingly significant threat to governments, research institutions, businesses, and military organizations. Numerous malware variants have been developed with the aim of exfiltrating sensitive information, compromising industrial infrastructure operations, or extorting money causing serious financial, reputational, and operational repercussions for the affected entities. Among the most widespread types of malware are rootkits, botnets, spyware, trojans, and ransomware. Many of these, despite posing a serious threat, rely on traditional asymmetric cryptographic primitives such as Key Encapsulation Mechanisms (KEMs) and Digital Signature Algorithms (DSAs), which are vulnerable to the advent of Quantum Computing. An attacker equipped with a sufficiently powerful quantum computer could employ algorithms such as Shor's and Grover's to derive private keys from public ones, thereby compromising the entire security model upon which these systems are based. Consequently, the transition towards post-quantum cryptographic algorithms becomes imperative in order to guarantee robustness and long-term resilience in such adversarial scenarios. In this context, this study proposes the design and implementation of a post-quantum ransomware/mal-ware, capable of successfully fulfilling its objectives even in the presence of an adversary with quantum capabilities. The malware leverages post-quantum cryptographic primitives, integrated with a decentralized, blockchain-based PKI infrastructure compatible with quantum-resistant algorithms, thereby ensuring the system's resilience in a post-quantum cryptographic landscape.
File in questo prodotto:
File Dimensione Formato  
QuantumCry_The_Engineering_and_Implementation_of_a_Post-Quantum_Ransomware_.pdf

non disponibili

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Copyright dell'editore
Dimensione 989.54 kB
Formato Adobe PDF
989.54 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11386/4945439
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact